Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules

被引:11
|
作者
Reece, Trey [1 ]
Robinson, William H. [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, Secur & Fault Tolerance Res Grp, 221 Kirkland Hall, Nashville, TN 37235 USA
基金
美国国家科学基金会;
关键词
Circuit Synthesis; design methodology; formal verification; security; TAXONOMY;
D O I
10.1109/TCAD.2015.2459038
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 50 条
  • [1] Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis
    Chen, Xiaoming
    Liu, Qiaoyi
    Yao, Song
    Wang, Jia
    Xu, Qiang
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) : 1370 - 1383
  • [2] Using intellectual property agreements in the presence of supplier and third-party copycatting
    Ghamat, Salar
    Pun, Hubert
    Critchley, Greg
    Hou, Pengwen
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 680 - 692
  • [3] Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property
    Waksman, Adam
    Sethumadhavan, Simha
    Eum, Julianna
    IEEE DESIGN & TEST, 2013, 30 (02) : 8 - 16
  • [4] Detecting Malicious Modifications of Data in Third-Party Intellectual Property Cores
    Rajendran, Jeyavijayan
    Vedula, Vivekananda
    Karri, Ramesh
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [5] Trust-minimized Integration of Third-Party Intellectual Property Cores
    Pauls, Friedrich
    Haas, Sebastian
    Hasler, Mattis
    2023 20TH INTERNATIONAL SOC DESIGN CONFERENCE, ISOCC, 2023, : 53 - 54
  • [6] Protecting your intellectual property against third-party infringers and patents
    Bianco, Krista
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 248
  • [7] Third-party Relationships and Third-party Protection in the European Property Law Regulations
    Mankowski, Peter
    RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
  • [8] Fine Grained Confinement of Untrusted Third-Party Applications in Android
    Pande, Prateek
    Mallaiah, Kurra
    Gandhi, Rishi Kumar
    Medatiya, Amit Kumar
    Srinivasachary, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 372 - 376
  • [9] Efficient data authentication in an environment of untrusted third-party distributors
    Atallah, Mikhail J.
    Cho, YounSun
    Kundu, Ashish
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 696 - 704
  • [10] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404